Supercharge AI: GPU Power Meets Cyber Resilience

As artificial intelligence (AI) transforms enterprise operations - from customer engagement to product innovation - the demand for high-throughput, secure infrastructure has become paramount.

Central to this transformation is the graphics processing unit (GPU) - as made prominent by leading vendor NVIDIA, which now handles an overwhelming portion of AI model training and inference workloads.

According to KD Market Insights, the GPU market is projected to grow at a compound annual growth rate (CAGR) of 14.2% from 2024 to 2033, reaching an estimated revenue of USD 1,409.7 billion ($1.4 Trillion!) by the end of 2033.

However, two often-overlooked components are equally critical to the performance of AI platforms: storage system throughput and cybersecurity readiness. Gartner provides detailed information regarding the importance of these elements in ensuring an overall robust AI infrastructure.

Bridging The Gap: Storage systems must evolve to match GPU speed

Modern AI models process massive datasets, and their effectiveness increasingly hinges on how efficiently data can be delivered to GPU clusters. GPUs equipped with substantial internal memory configurations and high-speed networking technologies highlight the necessity for external storage systems to deliver way beyond what legacy storage can offer.

Given that each GPU typically can drive around 2GB per second of data throughput, an 8-GPU configuration demands 16GB per second - requirements that multiply significantly in larger AI superclusters. The priority, therefore, is not merely raw storage capacity but the throughput efficiency per petabyte. 

File Systems, Object Storage & GPUDirect

POSIX-compliant file systems remain foundational to AI workflows, especially when paired with NVIDIA’s GPUDirect - a technology that enables direct I/O between storage and GPU memory, eliminating CPU bottlenecks. Yet, a transition is underway.

Object storage keeps gaining ground - particularly in cloud environments where hyperscale providers deploy it extensively. Given the advantages in scale of object storage, and its intrinsically lower overhead vs file systems, collaborations with storage vendors in the storage market suggest that soon an object-native storage access method for GPUDirect will become standard practice, including in on-prem deployments. Multiple articles and analysts have recently discussed these advantages of object storage for AI model processing.

However, real-time inference workloads, which rely on rapid “in-memory” processing of billions (and soon trillions) of model “tokens”,  are less suited to large-scale external storage. These applications require ultra-low latency and compute-proximate storage, reinforcing the need for storage architectures that are finely tuned to specific use cases.

Storage: Still a blind spot in AI team strategies

Despite its omnipresence, storage is often deprioritised by AI and data science teams. Many projects continue to rely on legacy infrastructure, even as newer solutions emerge, tailored specifically for AI workloads. As AI models become more complex and data-intensive, the need for scalable, high-performance storage is critical. Disaggregated storage architectures, which separate storage resources from compute resources, enable independent scaling and efficient resource utilisation, addressing the high-performance demands of modern AI applications .

The Other Bottleneck: Security in high-performance AI environments

While performance remains at the forefront of our minds, the security posture of AI infrastructure is becoming increasingly critical. This is especially true as workloads move into multi-tenant, cloud-native environments. Technologies such as GPUDirect, while boosting throughput, can also introduce new security vulnerabilities.
For example, shared GPU memory can lead to unauthorised data access (leakage), allowing unauthorised access across tenants. Direct interface access opens pathways for malware injection via memory buffer exploits.

Furthermore, in insufficiently isolated environments, a compromised workload from one tenant can threaten the integrity of others.

These risks are amplified in cloud and high-performance computing (HPC) contexts, where hardware is virtualised and shared across users. Yet, many organisations continue to assume such environments are inherently secure - an assumption that may prove costly.

Securing AI workloads: A strategic framework

To effectively secure AI workloads in high-performance computing environments, enterprises must evolve beyond static, perimeter-based defences and adopt infrastructure-deep, workload-aware security strategies. This necessitates a resilient framework that embeds security into the core of AI infrastructure. Key components include the implementation of granular access controls that enforce strict, identity-based policies governing access to GPUs and storage resources. 

Equally critical is the deployment of comprehensive encryption protocols that protect data across its entire lifecycle - at rest, in transit, and, where technically feasible, during processing - leveraging advanced technologies such as homomorphic encryption and Trusted Execution Environments (TEEs). 

Additionally, organisations should adopt software-defined storage architectures that are inherently resilient, integrating cyber-defence mechanisms like data immutability, write-once-read-many (WORM) capabilities, and real-time anomaly detection. Finally, secure-by-design object storage solutions must be prioritised, particularly in cloud-native deployments, offering native telemetry, built-in threat detection, and automated recovery workflows to ensure data integrity and availability under adverse conditions.

Accelerate With Caution: Mastering the Speed-Security Balance

As AI platforms grow in scale and complexity, the trade-off between performance and security must be reimagined. In reality, organizations can no longer afford to prioritize one at the expense of the other–in fact, both are indispensable.

The future of AI infrastructure lies in high-throughput, low-latency storage systems, increasingly built around object storage paradigms with direct GPU integration, and hardened through modern, adaptive cybersecurity measures. Enterprises that align their infrastructure strategies with this vision will be positioned to harness AI’s transformative power securely and sustainably.

Paul Speciale is Chief Marketing Officer at Scality

You Might Also Read:

A New Era Of Accelerated Computing:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cybersecurity Threats In The Automotive Industry
Using Cloud & Unified Communications To Enhance Collaboration & Productivity »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.